SvKMS

StorMagic ‘How-To’ Series: Upgrading an SvKMS 3-Node Cluster

Welcome back to the StorMagic ‘How-To’ video series! This series has been produced for our customers and partners, and is designed to demonstrate how to perform different actions in the setup and configuration of our software products: SvSAN and SvKMS. It is led by our Pre-Sales Support team. The past several videos in this series have covered different tutorials for [...]

StorMagic ‘How-To’ Series: Configuring SvSAN with SvKMS Encryption Key Management

StorMagic Technical Pre-Sales Engineer, Steve Bettison, recently produced a new series of training videos for our customers and partners. Within this series, Steve demonstrates how to perform certain actions in the setup, configuration, and general operation of our software products -- SvSAN and SvKMS. The first set of videos in this ‘How-To’ series cover training demonstrations for SvSAN, our virtual [...]

Do Your Part, #BeCyberSmart: StorMagic Celebrates Cybersecurity Awareness Month 

Over the past several decades, the world has become increasingly dependent on technology. The advent of technology has brought with it several advantages, including increased accessibility to information, innovation across many different fields, time and cost efficiencies, and better communication. However, it has also opened up the door to some serious problems -- one of the most common being cyber [...]

Infographic: Giant Eagle with StorMagic SvSAN and SvKMS

Keeping a retail organization’s instore applications online is critical to ensure shops remain open, but it is even more paramount for pharmacy systems and patient data. Giant Eagle, one of the United States’ largest food retailers needed a solution to eliminate downtime and keep their instore pharmacies operational and their data secure. The infographic below details how Giant Eagle turned [...]

Infographic: StorMagic’s 15th Birthday

In 2021, StorMagic celebrates its 15th birthday. In the infographic below we’ve pulled together 15 interesting facts and stats from across our history so far. You can read about them too in our 15th birthday blog. We’d also love to hear your own stories and memories of working with StorMagic – you can share them by contacting us. Happy birthday [...]

Next Generation Encryption: ARIA, StorMagic and HPE

A joint webinar with ARIA Cybersecurity Solutions and HPE Traditional hardware security modules (HSMs) present several different challenges for organizations looking to secure their data through encryption. They’re often large, bulky, expensive, and can be difficult to upgrade, configure and scale. ARIA microHSM, with built-in StorMagic SvKMS, is the industry’s smallest general purpose HSM. It provides [...]

An Introduction to Trusted Computing: What It Is and How StorMagic Is Utilizing It with SvKMS

What is Trusted Computing? Trusted Computing is a broad term that refers to technologies and proposals that aims to make computing more secure through hardware enhancements and associated software modifications. It can be broken down into four different categories: Memory Curtaining: Provides full isolation of sensitive areas of memories, and keeps memory from being read or written to inappropriately. This [...]

StorMagic SvKMS Data Sheet

Encryption key management that adapts to any environment: SvKMS Data Sheet StorMagic SvKMS is an encryption key management solution that can be deployed in any environment. It simplifies complex security and key management infrastructure by providing centralized management and, illustrated below, the ability to deploy a KMS to wherever it is needed. This makes it perfect not only for [...]

StorMagic Expands Partnership with Nutanix, Introducing New Product Validations with SvKMS

StorMagic has joined the Nutanix Elevate Technology Alliance Partner Program, and our encryption key management solution, SvKMS, has been validated with Nutanix data encryption and their AHV hypervisor. What Does This Mean? SvKMS has been named a Nutanix Ready validated solution, for customers looking to implement a third party key manager with Nutanix built-in encryption, or that want to operate [...]

StorMagic Expands VMware Ready Partnership with SvKMS Certification and Marketplace Listing

Under its vSphere 6.5 release, VMware enabled the ability to encrypt VMs for data-at-rest encryption, a tried-and-true data security approach. This capability has continued through vSphere versions 6.7 and 7.0, and is now available for vSAN encryption. While VMware has made turning on encryption easy, customers require a third-party key management server (KMS) that supports the key management interoperability protocol [...]

StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence Awards

We are excited to announce that StorMagic was selected as a gold winner in two different categories of the 2021 Cybersecurity Excellence Awards. StorMagic KMaaS was awarded gold in the “Cybersecurity Product / Service Awards -- Data Security” category, and SvKMS in the “Cybersecurity Industry Solutions Awards -- Manufacturing” category. Each year, Cybersecurity Insiders hosts its Cybersecurity Excellence Awards program, [...]

Commvault Certifies StorMagic SvKMS as a Third-Party Encryption Key Management Solution

We are excited to announce that SvKMS is now officially certified as a third-party encryption key management solution for Commvault encrypted backups. Commvault is a data management company that specializes in backup and recovery, cloud and infrastructure management, retention, and compliance. Nowadays, there is an increased need to protect data that exists in disparate environments -- from the edge, datacenter [...]

A Modern HSM Built for Today’s Encryption Needs

A joint webinar with ARIA Cybersecurity Solutions Legacy hardware security modules (HSM) appliances aren't well-suited to meet today's organization encryption needs. Deployed as a stand-alone, "black-box" appliance attached to the network is costly in both equipment and power consumption. Also, these appliances cause variable roundtrip latency that can potentially impact application performance, response times, and business processes. Maybe more [...]

Encryption Key Management Best Practices for Advanced Data Protection

How is your data being protected from unauthorized access and use? Although encryption key management is incredibly important, many IT and security professionals are often unaware of best practices for managing encryption keys. If these best practices are not implemented, it can lead to an insecure system that increases the risk of encryption keys being compromised, opening the doors of [...]

StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM

StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware security module (HSM) -- ARIA [...]

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premises HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for an organization’s current data protection [...]

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential difficulties that can affect the [...]

Implementing IT Systems within Pharmacies: Challenges, Requirements, and More

Everyone has made a trip to the pharmacy at some point in their lives. But have you ever stopped to think about the technologies pharmacies utilize and how much data they’re generating, sharing, and storing on a daily basis? There are many steps that go into the process of getting the right medication into the hands of the right patient, [...]

6 Technology Trends That Improve Data Security for any Cloud

Enterprises are moving more data to the cloud and running more applications in the cloud. But is your security framework flexible enough to protect any environment confidently? New developments from Cloud Providers offer enhanced security for any cloud environment– from private, public and hybrid clouds to multiclouds and edge-to-cloud. But how can organizations extend platinum-level data security beyond public clouds [...]

Infographic: New Integrations Available With SvKMS 2.5

With the launch of the latest version of StorMagic SvKMS, this SvKMS 2.5 infographic accompanies the release with all of the key information on what's new. SvKMS 2.5 introduces a number of new integrations, allowing organizations even greater security of their cloud applications and data. Google Cloud EKM, Azure Key Vault Managed HSM, Salesforce Shield and BitLocker can all now [...]

SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations

We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available -- SvKMS 2.5. SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed HSM BYOK, Salesforce Shield, and [...]

Encrypting in MongoDB? You’ll Need a Third Party Key Manager

Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world's biggest database players, competing with large incumbent companies like Oracle and Microsoft SQL Server. noSQL databases are [...]

Initializing a Multi-Node Cluster and Configuring StorMagic SvKMS with Different Applications

StorMagic SvKMS is a one-of-a-kind key management solution, designed specifically for modern encryption infrastructures. It simplifies complex security configurations by providing a centralized, one-stop approach to key management and enables customers to deploy encryption wherever they need it - whether at the edge, datacenter, or cloud. SvKMS delivers the following benefits to customers: Flexible: SvKMS enables businesses to deploy enterprise [...]

Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption

As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements -- especially for sensitive data. Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, storage, networking, and security, to [...]

Ensure Strong Data Protection by Combining StorMagic SvKMS and Commvault Encrypted Backups

Data is the lifeblood of an organization. Whether it be customer data stored in a database, or a record of transactions that’s part of a larger order management system, data is what fuels the modern enterprise. As more and more companies store their data across the cloud, multiple clouds, and hybrid-systems, protecting that data has become critical. What happens when [...]

Live Demo: StorMagic Key Management as a Service (KMaaS)

We are excited to announce the launch of StorMagic Cloud Services, and our first cloud service offering: Key Management as a Service (KMaaS). Designed to simplify IT services that other clouds can’t, StorMagic’s Cloud Services aim to eliminate the cost and pain of running storage and security software onsite. Join us for a live demonstration of the KMaaS feature [...]

StorMagic KMaaS Data Sheet

StorMagic Key Management-as-a-Service (KMaaS) StorMagic KMaaS is a cloud-based encryption key management service that delivers painless security for any encryption workload. It allows businesses of all sizes to centrally store, manage, and consolidate key management functions across on-premises, private cloud, public cloud, hybrid cloud, SaaS, and a range of edge applications and endpoints. Flexible StorMagic KMaaS is incredibly [...]

Infographic: Key Management-as-a-Service

StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless of encryption workload or location. [...]

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a number of new business risks. [...]

Ecommerce Merchants: Stay Resilient in the Face of Downtime and Cyber Threats

Ecommerce has become a critical pillar of the global economy. Prior to the current pandemic, 2 billion people were buying from over 7 million online businesses according to etailinsights. As COVID-19 has progressed, brick-and-mortar businesses around the globe have adopted many new precautions and regulations to keep their customers safe. This includes transitioning to primarily, if not exclusively, selling their [...]

Infographic: StorMagic MSP Program

StorMagic's MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP's suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits in our MSP Program infographic [...]

IoT and Security: Protecting Data in the Internet of Things

The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints. The growth of these types of network capacities comes with huge potentials, as well [...]

SvKMS: Differentiated Data Security for MSPs

Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe. It’s no secret that cybersecurity has become an essential component within IT environments. In fact, Gartner predicts that [...]

StorMagic SvKMS MSP Data Sheet

Encryption Key Management for MSPs The Growing Demand for Encryption  Organizations around the world are realizing the criticality of protecting and securing their data, and are investing in cybersecurity infrastructure to keep their businesses and customers safe.  In the last decade, encryption use in organizations has increased from 25% to over 50% today. Encryption key management is vital to [...]

Live Demo: Witness the Power of StorMagic SvKMS – Webinar

StorMagic recently announced the availability of SvKMS, its first-ever modern, virtualized key management software solution. SvKMS delivers enterprise-grade key management that eliminates the pain of encryption, at a surprisingly low cost. It simplifies complex security and key management infrastructure by providing centralized management and the ability to deploy a KMS to wherever it is needed. This makes it perfect [...]

Webinar: StorMagic adquiere KeyNexus y lanza SvKMS para Gestión de Llaves Criptográficas

En StorMagic, estamos encantados de anunciar que hemos entrado al mercado de la seguridad informática, a través de la adquisición de KeyNexus, una empresa innovadora en la administración de llaves para el cifrado de datos. Juntos, StorMagic y KeyNexus producirán modernas soluciones de seguridad el Edge, el centro de datos, y la nube. También, con mucho gusto anunciamos que ya [...]

Beyond Data Encryption – The Need for an Enterprise Key Management System

Enterprise Strategy Group (ESG) is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. This report provides insight into why organizations must prioritize an efficient key management strategy alongside encryption for adequate cybersecurity and breaks down the challenges and requirements of modern key management. Abstract: Encryption is crucial to [...]

Bringing the Edge to the Core: StorMagic Launches SvKMS

StorMagic is thrilled to announce that it has acquired KeyNexus, an innovator and designer of encryption key management solutions. Together, StorMagic and KeyNexus are dedicated to delivering modern security solutions for the edge, datacenter, and cloud. This acquisition encompasses several exciting updates for StorMagic, its partners, and customers. These include the growth of our team, a new product offering, and [...]

StorMagic Acquires KeyNexus and Launches SvKMS Encryption Key Management – Webinar

Watch the full webinar on demand for additional information about this exciting announcement and to learn more about our new product. StorMagic is excited to announce that we have acquired KeyNexus, an innovator and designer of encryption key management solutions. Together, StorMagic and KeyNexus are dedicated to providing modern security solutions for the edge, datacenter, and cloud. We are [...]

Is Your Edge Site a Cybersecurity Weak Point?

What do you picture when you think of cyber crime? Gangs stealing credit card details? Computer whizzes hacking organizations and stealing data? Physical cyber-security attacks are probably not the first thing that come to mind. However, we are living in a time where demand for computing power is at an all time high and there are more edge computing sites [...]